1 回答
- 最新
- 投票最多
- 评论最多
0
Decided to give up with the idea and as the alternative, mount log files of the container into equivalent place on the host system. So a standard fail2ban installation would read those log files and set the host system IP tables accordingly. This worked well.
已回答 5 年前